We estimate that 85% of all email traffic on the Internet is spam. Spammers are growing wiser on a daily basis, learning new methods to manipulate common spam defenses and obtaining more sophisticated software to trick spam filters and penetrate email inboxes. In order to win the war against spam, businesses must evolve their spam defenses faster than spammers evolve their techniques.

Therefore, we allow no single test to cause an email to be flagged as spam. Instead, multiple tests are used in conjunction with a weighting system, where each test is assigned a point value. When as individual test fails, that point value is added to the overall weight. If the total weight of the email is greater than a certain threshold, the email is flagged as spam. Each customer can set his or her own spam filtering sensitivity level, which is used by this weighting system.

Thousands of email characteristics ("DNA") are used to identify spam

25 third-party spam databases, several DNS checks, and message-formatting tests are also used when analyzing each email

DNA and other data are used to perform more than 45 tests on every email

Tests are combined into a weighting system and assigned a value

When the total weight of an email is greater than a certain sensitivity threshold it will be flagged as spam

Integrates with Return Path and Bonded Sender to minimize false-positives

Sensitivity can be controlled by administrators and end users

Email users can add senders to their Safe List to ensure that email from these senders is never filtered as spam

Email users can add senders to their Blacklist to ensure that email from these senders is always filtered as spam

Email users have several options for handling email once it is flagged as spam

Email users can choose the exclusive setting, which allows them to block email from senders outside of their safe list

Email administrators can also manage global spam preferences, Safe Lists, and Blacklists at the domain and the user level

Our dual scanning virus protection scans all inbound and outbound emails using a multi-stage, dual scanner process. The process is broken down into the following four stages:

Stage 1: Restricted Attachments
Here, emails are scanned for dangerous types of file attachments. When an email is sent or received that contains a restricted file attachment, the email is rejected and the sender receives a "bounced" email notification informing them of the restriction.

Stage 2: Normalization
This stage searches for email formatting vulnerabilities that can be used by viruses to hide from virus scanners. If any vulnerability is found, our system corrects the formatting of the message so that it can be thoroughly scanned for viruses.

Stage 3: Decompression
Next, if the email contains any compressed attachments such as zip files, the compressed attachments are temporarily unzipped so that the contents can be scanned for viruses.

Stage 4: The Dual Virus Scan
After the above preprocessing is complete; two separate virus scanners are used to scan the email and all of its uncompressed attachments. Everything is scanned twice to ensure maximum protection against new virus threats. ClamAV (www.clamav.net) and F-Prot (www.f-prot.com) are the current scanners of choice, although our system was designed to be able to plug-in any virus scanner on the market, should the need to do so arise.

Add contacts to the Frequent Contacts list for quick access when composing an email message

View up-to-date contact information for users within your domain. This information is specified by your email administrator within the Company Directory section of the control panel

Import an address book from any email application (Outlook, Yahoo, Thunderbird, Gmail, etc.), and map the original fields to the corresponding fields in the webmail address book (e.g., mapping "Cellular Phone" to "Mobile Phone")